Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
…
continue reading
Reverse Proxy Podcasts
A live podcast about front end web design and UX.
…
continue reading
CISO Insights: The Cybersecurity Leadership Podcast Where Security Leaders Shape Tomorrow’s Defenses Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders. CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communicati ...
…
continue reading

1
The 2025 Convergence: AI, Critical Infrastructure, and the Supply Chain Siege
12:49
12:49
Play later
Play later
Lists
Like
Liked
12:49We analyze the defining cyber conflicts of 2025, dominated by state-sponsored actors like Volt Typhoon pre-positioning in critical infrastructure and groups like Salt Typhoon compromising global telecommunications networks for espionage. The season also saw ransomware evolve with extreme speed, exemplified by the Akira group's ultra-short dwell tim…
…
continue reading

1
The Great Reversal: From 'Safety-First' to the AI-Military Complex
17:20
17:20
Play later
Play later
Lists
Like
Liked
17:20Every major AI company, driven by the existential necessity of covering billions in development losses (the "Burn Rate Crisis"), discarded its ethical prohibitions to pursue lucrative defense contracts. This pivot involved companies like OpenAI removing the explicit ban on "military and warfare" and Anthropic creating "Claude Gov" models designed s…
…
continue reading

1
The Identity Crackdown: Escaping the Digital Prison
47:36
47:36
Play later
Play later
Lists
Like
Liked
47:36This episode explores the global race between governments implementing centralized digital IDs that risk mass surveillance and privacy erosion, versus decentralized models emphasizing Self-Sovereign Identity (SSI). We detail the complex threats posed by non-interoperable systems and "Digital Twins" technology, which aggregates scattered digital foo…
…
continue reading

1
Beyond the Firewall: Converging Cyber and Physical Defense
16:30
16:30
Play later
Play later
Lists
Like
Liked
16:30Modern organizations face hybrid threats that exploit the inherent gaps between information systems and physical facilities, making security convergence a daily operational necessity. We detail the foundational framework of risk assessment—which combines threat, vulnerability, and consequence—to ensure both physical access points and digital assets…
…
continue reading

1
The Digital Frontline: Hacktivists, Proxies, and the AI-Driven Border War
15:39
15:39
Play later
Play later
Lists
Like
Liked
15:39This episode examines the rapid escalation of the Cambodia–Thailand military conflict into cyberspace, driven by 19 distinct nationalist hacktivist groups, including AnonSecKh/BL4CK CYB3R and Keymous, starting immediately after physical clashes in July 2025. These groups leveraged low-complexity tactics like website defacements and mass Distributed…
…
continue reading

1
The Geopolitics of Code: Quantifying Risk in the Global Software Supply Chain
16:16
16:16
Play later
Play later
Lists
Like
Liked
16:16Global supply chains, particularly in critical sectors like technology, are facing unprecedented threats from sophisticated adversaries who exploit vulnerabilities in third-party software and digital ecosystems. This geopolitical reality is driving stringent international regulations, such as the EU's NIS2 Directive and Cyber Resilience Act (CRA), …
…
continue reading

1
The AI Paradox: Why Global Cyber Costs are Falling, But the Threat is Rising (The 5 Pillars of Readiness)
36:56
36:56
Play later
Play later
Lists
Like
Liked
36:56Cyber incidents are escalating sharply worldwide, characterized by a staggering 21 percent average annual growth rate in disclosed incidents since 2014 and the increasing sophistication of AI-driven attacks like deepfakes and advanced phishing. Despite this escalating threat volume, the global average cost of a data breach recently dropped by 9% to…
…
continue reading

1
Systematic Security: Protecting Sweden's Digital Frontline Amid Hybrid Threats.
14:56
14:56
Play later
Play later
Lists
Like
Liked
14:56Sweden's integration into NATO, coupled with sustained, sophisticated cyber operations from state actors like Russia, China, and Iran, has dramatically intensified the threat level against its Critical Infrastructure and Vital Societal Functions (VSF & CI). To combat this escalating threat, Swedish legislation, including the new Cybersecurity Act (…
…
continue reading

1
The Price of Smartness: Singapore's Digital Social Contract with Surveillance
17:53
17:53
Play later
Play later
Lists
Like
Liked
17:53Singapore's data landscape is legally defined by the exclusion of public agencies from the principal data protection law (PDPA), which creates significant disparities in data handling between the government and private entities. The national push for a "Smart Nation" integrates massive data collection through ubiquitous IoT sensors and mandatory pr…
…
continue reading

1
Ciberataques y la Brecha: El Reto Digital de Colombia
19:28
19:28
Play later
Play later
Lists
Like
Liked
19:28A pesar de su posición como líder en digitalización en América Latina, Colombia es un objetivo constante de ciberataques, con incidentes de ransomware que han paralizado a entidades gubernamentales críticas, incluyendo la rama judicial y el sector de la salud. Esta vulnerabilidad sistémica se agrava por la persistente brecha digital y socioeconómic…
…
continue reading

1
Hacked Dreams: The Cyber War for Colombia's Digital Economy
13:35
13:35
Play later
Play later
Lists
Like
Liked
13:35Colombia, while a dynamic hub for startups and innovation, is facing a severe and persistent threat landscape, being targeted by sophisticated ransomware and phishing campaigns that frequently compromise public administration, financial, and IT sectors. This vulnerability is compounded by foundational gaps, including concentrated telecom markets, u…
…
continue reading

1
Aotearoa's New Zealand Digital Shield: Navigating Privacy & Cyber Threats
17:28
17:28
Play later
Play later
Lists
Like
Liked
17:28Explore how New Zealand is proactively shaping its digital future, implementing new regulations like the Biometric Processing Privacy Code 2025 and a national AI strategy to safeguard personal information while fostering innovation. Discover the escalating cyber threat landscape facing Kiwis, from sophisticated AI-powered attacks and ransomware to …
…
continue reading

1
Aadhaar, AI, and Your Data: India's Privacy Tightrope
16:47
16:47
Play later
Play later
Lists
Like
Liked
16:47Explore India's journey with the Aadhaar system, the world's largest digital identity program, designed to provide unique identification to over 1.3 billion residents and revolutionize financial services. Delve into the complex challenges of balancing ubiquitous identification with robust cybersecurity threats, including AI-driven attacks, rampant …
…
continue reading

1
Golden State Guardrails: California's Tech Regulation Frontier
16:52
16:52
Play later
Play later
Lists
Like
Liked
16:52This podcast unpacks California's dynamic legislative landscape, exploring its pioneering efforts to regulate data privacy and artificial intelligence. We delve into key bills, from mandating universal opt-out signals in browsers (AB 566) and device-based age verification for minors (AB 1043) to expanding data broker transparency (SB 361) and estab…
…
continue reading

1
Cybersikkerhed i Danmark: Den Digitale Frontlinje
20:52
20:52
Play later
Play later
Lists
Like
Liked
20:52Følg med i Danmarks kamp for digital sikkerhed i 2025, fra EU-formandskabets kontroversielle "Chatkontrol"-forslag til den nationale implementering af NIS2-direktivet. Vi ser på, hvordan danske virksomheder og borgere påvirkes af et landskab med øgede cybertrusler – herunder høj cyberkriminalitet og spionage – og nye regler, samtidig med at regerin…
…
continue reading

1
Digital Denmark: Sovereignty at a Crossroads
19:04
19:04
Play later
Play later
Lists
Like
Liked
19:04Explore how Denmark, at the forefront of European digitalization, is navigating complex cybersecurity challenges in 2025. From spearheading controversial "Chat Control" proposals during its EU Council Presidency to strategically phasing out foreign Big Tech in favor of open-source solutions, this podcast unpacks the nation's bold moves towards digi…
…
continue reading

1
Fronteira Digital Brasileira: Desafios e Defesas Cibernéticas
21:13
21:13
Play later
Play later
Lists
Like
Liked
21:13Explore a complexa e dinâmica paisagem da cibersegurança no Brasil, um local globalmente proeminente para o cibercrime e um alvo frequente para ataques sofisticados, desde ransomware a espionagem patrocinada pelo estado. Aprofundamos nos desafios únicos enfrentados pela sua administração pública, serviços financeiros e infraestrutura crítica, exami…
…
continue reading

1
Data Under Siege: Brazil's LGPD and the Privacy Battle
15:56
15:56
Play later
Play later
Lists
Like
Liked
15:56Dive into Brazil's groundbreaking General Data Protection Law (LGPD), its critical role in safeguarding personal data, and its evolution amidst an explosion of cybercrime, including massive data leakages affecting millions of citizens. This podcast explores how the independent National Data Protection Authority (ANPD) enforces compliance, the uniqu…
…
continue reading

1
Digital Pulse, Cyber Peril: Securing Healthcare's IoMT
16:31
16:31
Play later
Play later
Lists
Like
Liked
16:31The integration of smart medical devices (IoMT) offers transformative healthcare benefits but simultaneously exposes patients to severe cyber risks, including device manipulation, data breaches, and service disruptions that directly threaten safety and erode trust. This episode critically examines the ethical and legal challenges surrounding inform…
…
continue reading

1
La corde raide numérique du Canada : Équilibrer la sécurité, la vie privée et la liberté d'expression en 2025
13:47
13:47
Play later
Play later
Lists
Like
Liked
13:47En 2025, le Canada est confronté à un paysage numérique de plus en plus complexe et menaçant, marqué par l'espionnage sophistiqué d'acteurs étatiques comme la Chine et la Russie, un écosystème de cybercriminalité mondial résilient et l'amplification des capacités de l'intelligence artificielle. Dans ce contexte, les législateurs canadiens s'adapten…
…
continue reading

1
The Great Digital Divide: Canada's 2025 Cyber Threats and Liberties
21:11
21:11
Play later
Play later
Lists
Like
Liked
21:11This podcast dives into Canada's rapidly evolving digital landscape in 2025, exploring the intensification of cyber threats from state-sponsored actors like the PRC and Russia, and sophisticated cybercriminals, all amplified by artificial intelligence. We examine the legislative battlefield, from the modernization of CSIS powers and the new Nationa…
…
continue reading

1
Mexico's Digital Crossroads: Privacy, Power, and the Biometric Future
16:11
16:11
Play later
Play later
Lists
Like
Liked
16:11Mexico's new Federal Law on the Protection of Personal Data Held by Private Parties (LFPDPPP) and the dissolution of its independent data authority mark a pivotal shift, introducing stricter rules and centralizing enforcement. This episode explores the profound implications for businesses, from expanded data definitions and AI accountability to the…
…
continue reading

1
El Cruce Digital de México: Entre la Privacidad, el Poder y el Futuro Biométrico
19:46
19:46
Play later
Play later
Lists
Like
Liked
19:46La nueva Ley Federal de Protección de Datos Personales en Posesión de los Particulares (LFPDPPP), efectiva desde marzo de 2025, y la disolución de su autoridad de datos autónoma, el INAI, marcan un giro fundamental que introduce reglas más estrictas y centraliza la aplicación de la ley. Este episodio explora las profundas implicaciones para las emp…
…
continue reading

1
Code of Life, Code Red: Protecting Your Digital DNA
50:49
50:49
Play later
Play later
Lists
Like
Liked
50:49Genomic data, our very biological blueprint, is rapidly becoming a currency of innovation and power, holding the foundation of health and personalized medicine. However, this sensitive information is also transforming into our biggest security risk, with documented vulnerabilities ranging from synthetic DNA-encoded malware to AI-driven genome manip…
…
continue reading

1
Hoosier Data Shield: Navigating Indiana's Digital Privacy Landscape
17:58
17:58
Play later
Play later
Lists
Like
Liked
17:58This episode delves into the Indiana Consumer Data Protection Act (ICDPA), also known as Senate Bill 5, a landmark privacy law signed in May 2023 and effective January 1, 2026. We explore how the ICDPA grants Indiana consumers expanded rights over their personal data, including the right to access, correct, delete, and opt-out of data sales and tar…
…
continue reading

1
The Cyber Frontline: Texas's Fight for Digital Security and Privacy
22:32
22:32
Play later
Play later
Lists
Like
Liked
22:32Recent events highlight a critical vulnerability in our digital world, from crippling ransomware attacks on vital infrastructure to massive data breaches exposing sensitive personal information. This podcast explores how Texas is responding, detailing major incidents like the Colonial Pipeline attack and PowerSchool data breach, alongside the state…
…
continue reading

1
Digital Crossroads: Securing Southeast Asia's Cyber Future
56:02
56:02
Play later
Play later
Lists
Like
Liked
56:02Southeast Asia stands at a pivotal point in its digital transformation, facing an intricate web of escalating cyber threats, geopolitical pressures, and fragmented cybersecurity landscapes. This podcast explores the critical challenges hindering the region's digital resilience, from sophisticated cyberattacks and supply chain vulnerabilities to inc…
…
continue reading

1
Digital Fortress: The GCC's Cybersecurity Battleground
1:15:25
1:15:25
Play later
Play later
Lists
Like
Liked
1:15:25Explore how the rapidly digitalizing Gulf Cooperation Council (GCC) faces an escalating array of sophisticated cyber threats, from state-sponsored attacks and hacktivism to AI-enabled weaponization. We delve into the comprehensive national strategies, significant investments, and capacity-building initiatives, like those in Bahrain and Saudi Arabia…
…
continue reading

1
Navigating the Patchwork: US State Privacy & AI Compliance Deadlines
14:53
14:53
Play later
Play later
Lists
Like
Liked
14:53In this episode, we unpack the critical compliance deadlines for U.S. state privacy and AI laws, spanning from immediate requirements in 2025 to strategic planning for 2028 and beyond. We explore how the phasing out of cure periods, the rise of Universal Opt-Out Mechanisms, and the complex landscape of AI governance are reshaping business operation…
…
continue reading

1
Shadow Ai: Securing the Future with Dynamic Secrets
17:12
17:12
Play later
Play later
Lists
Like
Liked
17:12This episode explores how identity-first infrastructure and dynamic secrets are fundamentally reshaping the landscape of cybersecurity. We discuss how moving beyond static credentials to granting cryptographically verifiable identities to non-human entities (NHIs) and leveraging temporary, automatically managed access tokens dramatically enhances s…
…
continue reading

1
Identity Sprawl: Unmasking the Invisible Digital Workforce
20:57
20:57
Play later
Play later
Lists
Like
Liked
20:57Identity sprawl, often called secrets sprawl, describes the unmanaged proliferation of digital credentials like API keys and tokens across an organization's IT environment. This widespread distribution creates a massive and expanded attack surface, as non-human identities (NHIs) often possess overprivileged access and their secrets are frequently e…
…
continue reading

1
The AI Paradox: Unmasking the Secrets Sprawl in 2025
16:13
16:13
Play later
Play later
Lists
Like
Liked
16:13In 2025, the rapid evolution of AI, from sophisticated agents and coding assistants to widespread no-code tools, is inadvertently fueling an unprecedented surge in secrets sprawl across enterprises. This episode delves into how human error, "shadow AI" usage, and interconnected agent-to-agent communications are exposing critical credentials in ever…
…
continue reading

1
Seattle's Digital Crossroads: Governing Tech & Trust
15:54
15:54
Play later
Play later
Lists
Like
Liked
15:54This podcast explores the complex landscape where Washington State's leading tech industry meets evolving data privacy laws and city policy challenges. We unpack how major players like Amazon navigate stringent regulations such as the My Health My Data Act, implement robust cloud governance and cybersecurity best practices, and respond to demands f…
…
continue reading

1
California Compliance Currents: Navigating Privacy, AI, and Cybersecurity in the Golden State
19:38
19:38
Play later
Play later
Lists
Like
Liked
19:38Dive deep into California's cutting-edge privacy and cybersecurity landscape, from the foundational CCPA and CPRA to the intricate new regulations governing Automated Decision-Making Technology (ADMT) and AI. We'll explore how businesses must navigate evolving compliance requirements, consumer rights, and state-led initiatives like Cal-Secure to pr…
…
continue reading

1
North Carolina's Cyber Crucible: Threats, Resilience, and the Digital Frontier
20:13
20:13
Play later
Play later
Lists
Like
Liked
20:13North Carolina is confronting an unprecedented surge in cyberattacks, with thousands of incidents impacting millions of residents and vital sectors annually. From pervasive ransomware and sophisticated phishing campaigns targeting healthcare, education, and government, to data breaches affecting major tech hubs like the Research Triangle, the digit…
…
continue reading

1
Oregon's Digital Frontier: Safeguarding Data & Businesses
17:53
17:53
Play later
Play later
Lists
Like
Liked
17:53Oregon's Digital Frontier explores the intensifying cyber threats facing Oregon businesses and residents, from frequent cyberattacks and data breaches to complex data privacy concerns. We delve into the state's comprehensive response, examining the impact of the Oregon Consumer Privacy Act (OCPA) and Oregon Consumer Information Protection Act (OCIP…
…
continue reading

1
The Virginia VCDPA: Tech's New Rules of Engagement
18:49
18:49
Play later
Play later
Lists
Like
Liked
18:49This episode delves into the Virginia Consumer Data Protection Act (VCDPA), which took effect on January 1, 2023, exploring how its comprehensive framework for data privacy is shaping the state's vibrant tech sector. We'll examine the specific rights granted to consumers, such as the ability to opt-out of targeted advertising and data sales, and th…
…
continue reading
Artificial intelligence is rapidly transforming New Zealand's digital landscape, offering new ways to process data, create content, and automate tasks, with services like ChatGPT gaining rapid user adoption. However, this rapid adoption raises significant privacy and cybersecurity concerns, including the malicious use of AI for fraud and deepfake i…
…
continue reading

1
Hungary's Digital Horizon: Navigating Cybersecurity, AI, and Data Privacy
23:03
23:03
Play later
Play later
Lists
Like
Liked
23:03This episode delves into Hungary's evolving digital landscape, focusing on its robust cybersecurity framework, the challenges and opportunities presented by AI, and stringent data protection regulations. We explore the impact of the NIS2 Directive, the 2024 Cybersecurity Act, and the Critical Infrastructure Act, alongside the National Authority for…
…
continue reading

1
Minnesota's Digital Shield: Navigating Cyber Threats and Data Privacy
16:34
16:34
Play later
Play later
Lists
Like
Liked
16:34Minnesota faces a relentless wave of daily cyberattacks targeting local governments, healthcare, and critical infrastructure, evidenced by a significant surge in malware reports following new incident reporting laws. In response, the state has enacted the Minnesota Consumer Data Privacy Act (MCDPA), a comprehensive law granting residents unpreceden…
…
continue reading

1
Ochrona Danych w Polsce: Wyzwania i Trendy w Erze Cyfrowej
26:44
26:44
Play later
Play later
Lists
Like
Liked
26:44Polska nawiguje przez złożony krajobraz ochrony danych, gdzie unijne RODO jest uzupełniane rozbudowanymi krajowymi ustawami, takimi jak Ustawa o Ochronie Danych Osobowych z 2018 roku i Ustawa z 2019 roku, która znowelizowała ponad 160 ustaw sektorowych. Firmy mierzą się z wyzwaniami, od luk w podstawowych zabezpieczeniach cybernetycznych, takich ja…
…
continue reading

1
The Democratization of Deception: Deepfakes Unleashed
19:27
19:27
Play later
Play later
Lists
Like
Liked
19:27Deepfake creation tools are now freely available, rapidly improving, and astonishingly easy to use, allowing anyone with minimal effort to craft convincing synthetic media. This widespread accessibility fuels a surge in sophisticated scams, financial fraud, and disinformation campaigns, making deepfakes a normalized part of everyday threats. Join u…
…
continue reading

1
AI Trust & Security: Navigating the OWASP AIMA
17:25
17:25
Play later
Play later
Lists
Like
Liked
17:25This episode delves into the OWASP AI Maturity Assessment (AIMA), a groundbreaking framework designed to enhance the security, trustworthiness, and compliance of AI systems. We explore why traditional security models often fall short in addressing AI's unique challenges, such as non-deterministic behavior, opaque decision logic, and data-centric vu…
…
continue reading

1
Brasil Digital: Geopolítica, Cibersegurança e Liberdade de Expressão em Xeque
7:48
7:48
Play later
Play later
Lists
Like
Liked
7:48Neste episódio, mergulhamos no complexo e crescente cenário das ciberameaças no Brasil, um dos países mais visados por criminosos e atores estatais. Exploraremos desde ataques de ransomware e phishing generalizados, que se aproveitam da baixa conscientização e da dependência tecnológica, até as vulnerabilidades intrínsecas à governança cibernética …
…
continue reading

1
The Digital Iron Dome: Security, Surveillance, and the Cloud
19:54
19:54
Play later
Play later
Lists
Like
Liked
19:54This podcast delves into Israel's ambitious "Cyber Dome" initiative, a multi-layered, AI-driven system designed to proactively defend the nation's cyberspace and critical infrastructure, drawing parallels to its renowned Iron Dome missile defense. We'll explore how this advanced defense leverages big data and artificial intelligence for early threa…
…
continue reading

1
Austria's Digital Fortress: Identity, Privacy & Cyber Resilience
19:44
19:44
Play later
Play later
Lists
Like
Liked
19:44This episode dives into the distinct digital journeys of Austria, a European nation making significant strides in technology adoption. We explore Austria's impressive progress in digital identity solutions like ID Austria, which provides 100% of its citizens with a secure digital proof of identity and unrestricted control over their personal data T…
…
continue reading

1
The IoT-IT Divide: Navigating the New Cybersecurity Frontier
13:03
13:03
Play later
Play later
Lists
Like
Liked
13:03In an increasingly connected world, the lines between traditional Information Technology (IT) devices and the burgeoning Internet of Things (IoT) are blurring, yet their fundamental differences create unique challenges. This episode delves into how IoT devices, with their direct interaction with the physical world and often limited built-in securit…
…
continue reading

1
The Smart Home Unlocked: Privacy and Security Risks
21:54
21:54
Play later
Play later
Lists
Like
Liked
21:54Smart home devices offer unparalleled convenience, from voice-controlled assistants and automated thermostats to video doorbells that let you see who's at your door. However, this interconnectedness comes at a significant cost, as these devices continuously collect vast amounts of personal data, from daily habits and purchases to biometric informat…
…
continue reading

1
The Digital Freedom Collective: Navigating Rights in the Connected World
1:36:46
1:36:46
Play later
Play later
Lists
Like
Liked
1:36:46In an era defined by unprecedented digital connectivity, we often find ourselves facing a paradox: immense convenience coupled with a profound loss of control over our personal data and online experiences. This podcast delves into the critical implications of surveillance capitalism and algorithmic manipulation on our privacy, freedom of expression…
…
continue reading

1
Estonia's Digital Frontier: Navigating the E-Journey of Identity and Smart Cities
1:08:09
1:08:09
Play later
Play later
Lists
Like
Liked
1:08:09Join us as we explore how Estonia transformed from a post-Soviet state into a global leader in digital governance, offering nearly all government services online and attracting entrepreneurs worldwide through its e-Residency program. We'll delve into the remarkable benefits of this digital revolution, from unparalleled convenience and citizen trust…
…
continue reading